Please turn on your JavaScript for this page to function normally.
Enterprise malware threat detection and response

HBGary and Verdasys announced an integrated enterprise security solution to detect and control malware threats. Available in July, the solution will feature HBGary’s …

Next-generation Trojan plunders East European bank accounts

Russian and Ukrainian banks have been lately trying to stop the onslaught of BlackEnergy 2, a Trojan that manages to bypass the Java application that the customers use to …

WordPress 3.0 released

WordPress 3.0, the thirteenth major release of WordPress and the culmination of half a year of work by 218 contributors, is now available for download and comes with 1,217 bug …

Text message phishing attacks drop significantly

Text-to-phone phishing attacks (often called “smishing”) dropped dramatically in the first quarter of 2010, according to a report by Internet Identity (IID). …

Free Internet security book for kids

As unstructured summertime looms, kids and teens are likely to be spending more time on the Internet. Now, a free download is available to help them keep themselves safer both …

Anti-virus Immunet Protect 2.0 released

Immunet released Protect Free 2.0, the latest version of the real-time anti-virus software for Windows. Immunet Protect is designed specifically to protect consumers and their …

Months-old Skype vulnerability exploited in the wild

A Skype flaw patched some 9 months ago with the new version (4.1.0.179) of the VoIP client has been spotted being exploited in the wild. According to M86 Security Labs, the …

Financial services firms hesitant to adopt cloud computing

Today’s financial services firms are avoiding popular IT infrastructure investments such as cloud computing, in large part due to data security and transparency …

New book: “Microsoft SQL Server 2008 Administrator’s Pocket Consultant”

Microsoft SQL Server 2008 Administrator’s Pocket Consultant, 2nd Edition is a concise, immediate reference you’ll want with you at all times as you deal with SQL …

iTunes 9.2 fixes security vulnerabilities

iTunes 9.2 comes with several new features, improvements and security fixes. ColorSync A heap buffer overflow exists in the handling of images with an embedded ColorSync …

(IN)SECURE Magazine issue 26 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 26 has been released today. Table of contents PCI: …

Nessus now audits Cisco routers and switches

Nessus now includes the ability to perform security and policy compliance configuration audits of Cisco IOS routers and switches. The audits are based on best practices …

Don't miss

Cybersecurity news